With new security features, is Dropbox safe for enterprises?

Web Application Security

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Insider edition: Web application security

    Developers building Web applications don’t give enough consideration to security. Often in a rush to get apps live, they’re pushed into production with glaring vulnerabilities that attacks can easily exploit, often in an automated manner. This Inside... 

  • A global look at application security threats and tools

    In this expert Tech Guide from the editors at SearchSecurity.com, learn about the latest application security threats and how to address them, and explore tools that can help you protect your organization from a malicious attack. 

  • Web application firewalls: A technical guide

    Web application firewalls are becoming critical data protection and compliance tools that any security decision maker must understand. SearchSecurity.com presents a comprehensive guide to Web application firewalls in which experts examine evaluation ... 

  • Negative exposure: Web scanners reveal unknown holes

    Enterprises increasingly need reliable technology to scan Web applications for vulnerabilities. But can organizations count on today's technology? This issue examines 2003's top Web application scanning products. Also in this issue: tools that make s... 

  • distributed denial-of-service attack (DDoS)

    On the Internet, a distributed denial-of-service (DDoS) attack is one in which a multitude of compromised systems attack a single target, thereby causing denial of service for users of the targeted system. 

  • Apache HTTP server project

    The Apache HTTP server project is a collaborative open source Web server development initiative. The project is spearheaded by the Apache Server Foundation. 

  • Web application (Web app)

    A Web application (Web app) is an application program that is stored on a remote server and delivered over the Internet through a browser interface. 

  • pen test (penetration testing)

    Penetration testing (also called pen testing) is a tool for testing a computer system, network or Web application to find vulnerabilities that an attacker could exploit. (Continued) 

  • National Computer Security Center (NCSC)

    The National Computer Security Center (NCSC) is a U.S. government organization within the National Security Agency (NSA) that evaluates computing equipment for high security applications to ensure that facilities processing classified or other sensit... 

  • JavaScript hijacking

    JavaScript hijacking is a technique that an attacker can use to read sensitive data from a vulnerable Web application, particularly one using Ajax (Asynchronous JavaScript and XML)... (Continued) 

  • buffer overflow

    A buffer overflow occurs when a program or process tries to store more data in a buffer (temporary data storage area) than it was intended to hold. 

  • cookie poisoning

    On the Web, cookie poisoning is the modification of a cookie (personal information in a Web user's computer) by an attacker to gain unauthorized information about the user for purposes such as identity theft. 

  • cache cramming

    Cache cramming is a method of tricking a computer into running Java code it would not ordinarily run. 

  • LUHN formula (modulus 10)

    The LUHN formula, also called modulus 10, is a simple algorithm used to validate the number on a credit card. 

  • See more Definitions on Web Application Security
About Web Application Security

Browse this section for the latest news, expert advice and learning tools on Web application security, including common threats and methods for protecting against them, Web application testing, assessment and firewalls including how to deploy a firewall.